Kevin,

Just to add a little to the comments you've already received:

1) After a compromise, you essentially have 2 approaches: One, 
cut the box off the network and leave it alone.  Call local law 
enforcement and the FBI.  This approach is used if you wish to 
pursue litigation.  I should point out that unless you have very 
detailed network logging showing times, IP addresses, etc. this 
approach will likely be a dead-end.  

The second approach is to assume your not going to pursue the 
attacker and concentrate on recovery.  Assume that everything on 
the box is suspect.  Re-format and start from scratch, install data 
from a good backup. If you don't have a good backup, you will want 
to remove all executable programs and replace them with known 
good ones, and then hope for the best.

2) If you don't have a good IDS system, including proper log 
monitoring on your end systems, you'll almost surely never know 
for certain how a box was compromised and more importantly you 
won't know what was done after the compromise.  You can make 
some educated guesses based on what services your running and 
what files _appear_ to have changed.  

However, there is always a problem that if you have a very clever 
attacker, what looks like a very simple script exploit could be a red 
herring and the attacker actually installed their own versions of 
some obscure executables.  If they're clever, the file sizes match, 
so you would need to compare known good hash values against 
hash values on all of your executables to be sure.  This is 
obviously a major pain.

In general, I always recommend having an experienced security 
person perform a complete audit on a network.  This is a lot more 
than just doing some remote scanning, its taking a comprehensive 
look at services, procedures, backup strategy, etc.  The problem is 
that these services are usually not cheap (but then again, neither is 
recovering from a compromise).  If you want a few quick hits:

1) Host security, get a good book on securing your particular host 
OS.

2) Application security, look at every app you run and find out what 
exploits are out there for that app.  You can find a list at many 
security sites but http://www.securityfocus.com is a good one.

3) Logging, use whatever logging is available for your OS and send 
the logs to an external central server.  Logs are usually one of the 
first things modified on a system after a successful compromise 
and they can tell you a lot IF they are on a trusted machine.

4) File integrity systems such as Tripwire and worth looking into for 
public facing servers.  They will help you determine what files have 
been changed after a compromise.

5) IDS systems can be very useful, but only if they are properly 
installed AND monitored.  A lot of IDS systems are not properly 
setup and not properly monitored, giving a false sense of security. 

6) Have a plan.  Even the most secure perimeters can be 
compromised, having a contingency plan can be the difference 
between a quick recovery and not recovering at all.  I recommend 
"The process of network security" as a good starting book.

HTH,
Kent

On 7 May 2001, at 10:32, Kevin O'Gilvie wrote:

> Apparently over the weekend Poison Box got pass my Pix and overwrote
> some files on the intranet Box and maybe more damage than I know of at
> this Moment. I need help on finding out hjw they got in and how to
> prevent it happeneing in the future. Please help.
> 
> Thanks,
> 
> Kevin
> _________________________________________________________________ Get
> your FREE download of MSN Explorer at http://explorer.msn.com
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html Report misconduct and
> Nondisclosure violations to [EMAIL PROTECTED]




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=3699&t=3452
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to